Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
NS, ICM, CQ, NV (Joint) |
2019-11-21 10:20 |
Hyogo |
Rokkodai 2nd Campus, Kobe Univ. |
Visual Analytics for Anomaly Classification in LAN Based on Deep Convolutional Neural Network Yuwei Sun, Hideya Ochiai, Hiroshi Esaki (UTokyo) NS2019-121 |
Recently, the attack monitored in Local Area Network (LAN) is surging. There are some methods being used to analyze the ... [more] |
NS2019-121 pp.7-12 |
QIT (2nd) |
2019-11-19 14:50 |
Tokyo |
Gakushuin University |
Capacity of Quantum Private Information Retrieval with Collusion of All But One of Servers Seunghoan Song, Masahito Hayashi (Nagoya Univ.) |
Quantum private information retrieval (QPIR) is the problem to retrieve one of f classical files by downloading quantum ... [more] |
|
HWS, VLD |
2019-03-01 16:45 |
Okinawa |
Okinawa Ken Seinen Kaikan |
A Counter Synchronization Method for MAC generation in CAN Communication Kanata Nishida, Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) VLD2018-135 HWS2018-98 |
The control of the automobile is realized by ECU. CAN is widely used as a network connecting the ECU. However, since CAN... [more] |
VLD2018-135 HWS2018-98 pp.249-254 |
ITS, IE, ITE-MMS, ITE-HI, ITE-ME, ITE-AIT [detail] |
2019-02-20 16:00 |
Hokkaido |
Hokkaido Univ. |
[Invited Talk]
Anomaly Detection for Smart Home Based on User Behavior
-- ICCE2019 Report -- Masaaki Yamauchi, Yuichi Ohsita, Masayuki Murata (Osaka Univ.), Kensuke Ueda, Yoshiaki Kato (Mitsubishi Electric) |
The operations of home IoT devices by attackers can cause serious problems.
However, such attacks are difficult to dete... [more] |
|
IA |
2018-11-28 16:05 |
Tokyo |
Akihabara Convention Hall, 5th Floor (Conference Room 5B) |
Scalable ARP Snooping Using Policy Based Mirroring of Core Switches Motoyuki Ohmori, Naoki Miyata (Tottori Univ.) IA2018-39 |
In order to handle a computer security incident or network failure, it is important to grasp a list of pairs of IP addre... [more] |
IA2018-39 pp.23-27 |
ICSS |
2018-11-22 11:15 |
Kagoshima |
|
[Invited Talk]
An Overview of Cyber Security for Connected Vehicles Junko Takahashi (NTT) ICSS2018-63 |
This paper presents an overview of cyber security for connected vehicles based on the recent previous studies of vehicle... [more] |
ICSS2018-63 pp.55-59 |
HWS, ICD |
2018-10-29 16:50 |
Osaka |
Kobe Univ. Umeda Intelligent Laboratory |
Security Evaluations of Automotive Attacks on FlexRay Junko Takahashi, Masashi Tanaka (NTT) HWS2018-55 ICD2018-47 |
This paper investigates a difficulty and a threat of previous attacks on FlexRay and reports that abnormal vehicle behav... [more] |
HWS2018-55 ICD2018-47 pp.47-52 |
IN, NS, CS, NV (Joint) |
2018-09-07 10:45 |
Miyagi |
Research Institute of Electrical Communication, Tohoku Univ. |
A Study of Scanning Hosts Classification Mechanism in IP Backbone Networks Yukihiro Togari, Hisashi Kojima, Takeshi Kuwahara (NTT) NS2018-102 |
We have researched a lightweight scan detection mechanism in the IP backbone networks. However, the existing mechanism c... [more] |
NS2018-102 pp.83-88 |
NS |
2018-05-17 10:00 |
Kanagawa |
Yokohama City Education Center |
Hierarchical Role-based Network Access Control using Software-Defined Networking Yu Tamura, Takashi Naito, Nattapong Kitsuwan (UEC) NS2018-15 |
This paper proposes a Hierarchical Role-based Network Access Control in which the hierarchical structure in a general or... [more] |
NS2018-15 pp.1-6 |
IA, IN (Joint) |
2017-12-14 16:45 |
Hiroshima |
Hiroshima City Univ. |
Anomaly Detection for Smart Home IoT based on Users' Behavior Masaaki Yamauchi, Yuichi Ohsita, Masayuki Murata (Osaka Univ.), Kensuke Ueda, Yoshiaki Kato (Mitsubishi Electric) IN2017-58 |
Many devices such as air conditioners and refrigerator have become connected to the Internet, and become a target of the... [more] |
IN2017-58 pp.73-78 |
ICSS |
2017-11-21 09:55 |
Oita |
Beppu International Convention Center |
A Study on the Security of Dynamic Multi-Cast Key Distribution Protocol After Static Secret Keys Revealed Masahiro Matsui, Yuki Okano, Reo Yoshida, Tetsutaro Kobayashi (NTT) ICSS2017-43 |
The security that an adversary can not guess the exchanged key after static secret key leaking is called Post Compromise... [more] |
ICSS2017-43 pp.29-34 |
IT |
2017-09-08 13:00 |
Yamaguchi |
Centcore Yamaguchi Hotel |
[Invited Talk]
Broadcast Encryption with Information Theoretic Security
-- Classical Results and Recent Progress -- Yohei Watanabe (UEC) IT2017-44 |
Information-theoretically secure cryptographic protocols have become increasingly important due to progress of quantum c... [more] |
IT2017-44 pp.31-36 |
IA |
2017-08-28 14:35 |
Tokyo |
IIJ Seminar Room |
Survey of IPv6 transition technologies for security analysis Gabor Lencse, Youki Kadobayashi (NAIST) IA2017-15 |
Due to the depletion of the public IPv4 address pool, the transition to IPv6 became inevitable. However, the transition ... [more] |
IA2017-15 pp.19-24 |
IA, SITE, IPSJ-IOT [detail] |
2017-03-03 14:50 |
Okinawa |
Culture Resort Festone (Okinawa) |
Network based detection of Remote Access Trojan communication by using packet entropy on early instruction stage Masumi Uno (NAIST), Masahiro Ishii (Tokyo Tech), Atsuo Inomata (TDU), Ismail Arai, Kazutoshi Fujikawa (NAIST) SITE2016-68 IA2016-98 |
Confidential information have been leaked accidentally by targetted attacks by targeted attacks.
Remote Access Trojan/t... [more] |
SITE2016-68 IA2016-98 pp.41-46 |
ICSS, IA |
2016-06-06 15:40 |
Saga |
Saga University |
Using Signal Strength to Improve the Key-Exchange Protocol in Wireless LAN Nariaki Tamaki, Takehiro Kawata (NTT) IA2016-4 ICSS2016-4 |
We propose the countermeasure technique to prevent key decipher, and improve the key-exchange protocol of IEEE 802.11 Wi... [more] |
IA2016-4 ICSS2016-4 pp.19-24 |
CPSY, DC, IPSJ-ARC [detail] |
2016-05-09 14:10 |
Toyama |
Unaduki Suginoi Hotel |
A Study of Contact Avoidance Routing in Delay Tolerant Networks Tomoya Osuki, Kazuya Sakai, Satoshi Fukumoto (Tokyo Metropolitan Univ.) CPSY2016-3 DC2016-3 |
We address a secure routing in delay tolerant networks (DTNs) that lack continuous network connectivity. While cryptogra... [more] |
CPSY2016-3 DC2016-3 pp.11-14 |
IA, SITE, IPSJ-IOT [detail] |
2016-03-03 13:00 |
Saga |
Nijino-Matsubara Hotel (Karatsu-shi, Saga-prefecture) |
Collaborative Spoofing Detection and Mitigation - SDN based looping authentication for DNS services Nor Masri bin Sahri, Koji Okamura (Kyushu University) SITE2015-58 IA2015-90 |
As DNS packet are mostly UDP-based, make it as a perfect platform for hackers to launch a well-known type of distributed... [more] |
SITE2015-58 IA2015-90 pp.55-60 |
IN, IA (Joint) |
2015-12-17 16:10 |
Hiroshima |
Hiroshima City University |
Neighbor-Disjoint Multi-Route Avoidance Routing Tetsuya Kanachi, Hiroaki Higaki (Tokyo Denki Univ.) IN2015-79 |
This paper proposes a novel routing protocol called neighbor-disjoint routing protocol in wireless multihop networks for... [more] |
IN2015-79 pp.49-54 |
QIT (2nd) |
2015-11-25 15:00 |
Kanagawa |
NTT Atsugi R&D center |
Robust Decoy State Generation with a Nested Modulator Kensuke Nakata, Akihisa Tomita, Atsushi Okamoto (Hokkaido Univ.) |
In decoy-BB84 quantum key distribution (QKD) protocol, intensity fluctuation of the transmitted optical pulses reduce se... [more] |
|
LOIS, ISEC, SITE |
2015-11-06 16:20 |
Kanagawa |
Kanagawa Univ. |
A Feasibility Study of Autonomous Security Infrastructure in the Internet Hiroshi KobayashiI, Hirofumi Yamaki, Yoichiro Ueno, Kaoru Sano, Ryoichi Sasaki (TDU) ISEC2015-46 SITE2015-33 LOIS2015-40 |
Cyber-attacks have become increasingly radicalized and sophisticated in recent years. There is a limit to the security a... [more] |
ISEC2015-46 SITE2015-33 LOIS2015-40 pp.67-74 |